We compared Tenable Nessus and Tenable Vulnerability Management based on our user's reviews in several parameters.
Tenable Nessus is highly praised for its customer service, cost-effectiveness, and valuable cybersecurity enhancements, while Tenable Vulnerability Management is commended for its efficient scanning capabilities and accurate reporting. Users specifically highlight the ease of use of Tenable Nessus and the need for improvements in the user interface and scan speed for Tenable Vulnerability Management.
Features: Tenable Nessus is praised for its comprehensive scanning capabilities and ability to identify and prioritize vulnerabilities, while Tenable Vulnerability Management stands out for its accurate reporting and effective vulnerability prioritization. Users also appreciate the ease of use for both products.
Pricing and ROI: The setup cost for Tenable Nessus is considered relatively low, while Tenable Vulnerability Management has a straightforward and hassle-free setup process. Users appreciate the licensing process of both products, with Tenable Nessus offering a straightforward process and Tenable Vulnerability Management offering flexible options tailored to specific needs., Tenable Nessus provides significant value with its effective vulnerability identification, reliable scanning, comprehensive reporting, and ease of use. Tenable Vulnerability Management excels in efficiency, risk documentation, ease of use, and integration with existing infrastructure.
Room for Improvement: Tenable Nessus has received feedback on areas for improvement, while Tenable Vulnerability Management needs enhancements in user interface, scan speed, customization options, reporting capabilities, and addressing software glitches and false positives.
Deployment and customer support: The users' reviews for Tenable Nessus and Tenable Vulnerability Management show differences in the duration required for establishing a new tech solution. While some users mentioned separate timeframes for deployment and setup for Tenable Vulnerability Management, it is likely that for Tenable Nessus, these terms refer to the same period., Customers have expressed high regard for the customer service and support provided by both Tenable Nessus and Tenable Vulnerability Management. They have praised the effectiveness, responsiveness, and knowledge of the support teams in resolving issues promptly. Customers have also mentioned their satisfaction with the level of assistance and guidance provided.
The summary above is based on 64 interviews we conducted recently with Tenable Nessus and Tenable Vulnerability Management users. To access the review's full transcripts, download our report.
"Nessus is effortless to integrate."
"Out of the box, the product works well for us, so it's not a tool that we need to customize very much."
"The initial setup is very straightforward."
"The automatic scanner and scheduler are pretty cool."
"Tenable Nessus has a good performance, is very user-friendly, and is easy to use."
"The product's most valuable features are vulnerability and asset management. It can define the rules and validate the configuration."
"It is easy to deploy and easy to use. Its reporting is good. From this reporting, you can see the pain point in your network, which makes it easy to fix them. It is easy to understand the reports and export them."
"It gives a holistic view of your entire environment."
"Technical support has been good. They respond quite quickly."
"The solution creates vulnerability tickets within the VM profile but should also include them under the Remediation tab so the fixes can be viewed in the ticketing queue."
"You can customize each point in new scans."
"The initial setup is straightforward so long as your infrastructure, components, and networks are in place."
"It is pretty stable. I would rate it nine or maybe ten."
"The solution is quite friendly."
"The solution is easy to use and configuration is smooth with no complexities."
"The product is easy to use."
"I would like to have a management option after the network scanning."
"You can scale Nessus to the extent that you can afford it. You need to have a license for every device you scan. As long as you can afford the increased costs, you won't have a problem scaling it."
"I think the reporting templates could be improved with Tenable Nessus."
"The price could be more reasonable. I used the free Nessus version in my lab with which you can only scan 16 IP addresses. If I wanted to put it in the lab in my network at work, and I'm doing a test project that has over 30 nodes in it, I can't use the free version of Nessus to scan it because there are only 16 IP addresses. I can't get an accurate scan. The biggest thing with all the cybersecurity tools out there nowadays, especially in 2020, is that there's a rush to get a lot of skilled cybersecurity analysts out there. Some of these companies need to realize that a lot of us are working from home and doing proof of concepts, and some of them don't even offer trials, or you get a trial and it is only 16 IP addresses. I can't really do anything with it past 16. I'm either guessing or I'm doing double work to do my scans. Let's say there was a license for 50 users or 50 IP addresses. I would spend about 200 bucks for that license to accomplish my job. This is the biggest complaint I have as of right now with all cybersecurity tools, including Rapid7, out there, especially if I'm in a company that is trying to build its cybersecurity program. How am I going to tell my boss, who has no real budget of what he needs to build his cybersecurity program, to go spend over $100,000 for a tool he has never seen, whereas, it would pack the punch if I could say, "Let me spend 200 bucks for a 50 user IP address license of this product, do a proof of concept to scan 50 nodes, and provide the reason for why we need it." I've been a director, and now I'm an ISO. When I was a director, I had a budget for an IT department, so I know how budgets work. As an ISO, the only thing that's missing from my C-level is I don't have to deal with employees and budgets, but I have everything else. It's hard for me to build the program and say, "Hey, I need these tools." If I can't get a trial, I would scratch that off the list and find something else. I'm trying to set up Tenable.io to do external PCI scans. The documentation says to put in your IP addresses or your external IP addresses. However, if the IP address is not routable, then it says that you have to use an internal agent to scan. This means that you set up a Nessus agent internally and scan, which makes sense. However, it doesn't work because when you use the plugin and tell it that it is a PCI external, it says, "You cannot use an internal agent to scan external." The documentation needs to be a little bit more clear about that. It needs to say if you're using the PCI external plugin, all IP addresses must be external and routable. It should tell the person who's setting it up, "Wait a minute. If you have an MPLS network and you're in a multi-tenant environment and the people who hold the network schema only provide you with the IP addresses just for your tenant, then you are not going to know what the actual true IP address that Tenable needs to do a PCI scan." I've been working on Tenable.io to set up PCI scans for the last ten days. I have been going back and forth to the network thinking I need this or that only to find out that I'm teaching their team, "Hey, you know what, guys? I need you to look past your MPLS network. I need you to go to the edge's edge. Here's who you need to ask to give me the whitelist to allow here." I had the blurb that says the plugin for external PCI must be reachable, and you cannot use an internal agent. I could have cut a few days because I thought I had it, but then when I ran it, it said that you can't run it this way. I wasted a few hours in a day. In terms of new features, it doesn't require new features. It is a tool that has been out there for years. It is used in the cybersecurity community. It has got the CV database in it, and there are other plugins that you could pass through. It has got APIs you can attach to it. They can just improve the database and continue adding to the database and the plugins to make sure those don't have false positives. If you're a restaurant and you focus on fried chicken, you have no business doing hamburgers."
"Online learning could be a bit better."
"There is room, overall, for improvement in the way it groups the workstations and the way it detects, when the vulnerability is scanned. Even when we would run a new scan, if it was an already existing vulnerability, it wouldn't put a new date on it."
"EQA's and dashboards should be addressed in the next release."
"The reporting is a bit cumbersome."
"The solution must be promoted more in the market."
"They need to have more dependable and faster support."
"The UI has room for improvement."
"Users get confused between VPR and CVSS ratings."
"I would like the solution to cover the whole cycle of mitigation since it's an area where the solution currently lacks."
"The interface could be improved; right now it's running on two interfaces simultaneously."
"They should include better customization of the dashboard, and integration tools."
"The only drawback of the solution is that it is expensive."
More Tenable Vulnerability Management Pricing and Cost Advice →
Tenable Nessus is ranked 3rd in Vulnerability Management with 37 reviews while Tenable Vulnerability Management is ranked 2nd in Vulnerability Management with 28 reviews. Tenable Nessus is rated 8.4, while Tenable Vulnerability Management is rated 8.2. The top reviewer of Tenable Nessus writes "Reasonably priced, reliable, and flexible". On the other hand, the top reviewer of Tenable Vulnerability Management writes "Though it is scalable and has an easy setup phase in place, the solution is an expensive one ". Tenable Nessus is most compared with Qualys VMDR, Rapid7 InsightVM, Tenable Security Center, Pentera and Microsoft Defender Vulnerability Management, whereas Tenable Vulnerability Management is most compared with Tenable Security Center, Qualys VMDR, Microsoft Defender Vulnerability Management, Amazon Inspector and Rapid7 InsightVM. See our Tenable Nessus vs. Tenable Vulnerability Management report.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Tenable Nessus is a vulnerability assessment solution that is both easy to deploy and easy to manage. The design of the program is such that if a company should desire to handle the installation themselves, they would be able to do so. The updates that the program requires to keep up-to-date take up a large portion of the setup time. Tenable Nessus can be deployed in under an hour. The speed of an organization’s internet can impact how quickly the deployment will go. Furthermore, once it has been set up, only a small management team is necessary for maintenance. Tenable Nessus is an incredibly important program that provides businesses and organizations with robust protection. This ease of deployment and management gives it an edge over the competition.
Tenable.io Vulnerability Management is basically comparable to Tenable Nessus in regards to setup and management. It is relatively straightforward to set up. A single person could deploy it in a non-business setting in a matter of hours. The setup can be handled without requiring a business to rely on the help of outside consultants. As with Tenable Nessus, a small team of two or three people is all that is necessary to manage the solution. Organizations can save a great deal of time and resources by choosing to utilize this solution.
Tenable Nessus is a solution with good scalability. This can be accomplished with relative ease. However, the load that it can handle makes it a poor fit for larger organizations. At a certain point, the farther up you scale it, the more the solution quality diminishes.
Tenable.io Vulnerability Management is able to offer a much higher level of scalability. It is typically used without trouble by organizations with many thousands of users. As with Tenable Nessus, the process is relatively simple.
Conclusion:
The actual difference in time and ease as far as deploying Tenable Nessus versus Tenable.io Vulnerability Management is negligible and cannot truly set one apart from the other. Ease of management is another area where these two solutions are very similar. A major difference between them is their scalability. While both can be scaled relatively easily, Tenable.io Vulnerability Management is able to handle a higher level of scalability, with the diminishment of quality being a far lesser concern than is the case with Tenable Nessus.